Microsoft Word has long offered support for loading images and templates over the network. This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates. Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials. […]

Digital innovation continues to disrupt industries at lightning speed. Today’s organizations are transforming their entire business – from strategy to operations, technology to culture – to better deliver value to their customers. In 2017, we compiled the top 10 trends leaders needed to know when it came to their digital transformation journey. In this 10-week […]

As mentioned in our intro blog, Salesforce Shield: Bringing Compliance to the Cloud, customer information security is critical to Salesforce’s success. In this blog, we’re going to take a look at another part of Salesforce Shield Platform Encryption. When regulations require more protection Your data is already very secure. But to meet the increasingly demanding […]

In this first part of my Maximo Data Loading series, I will cover the Maximo Application Data Import Export functionality. This is great functionality that was introduced in version 7.5, and many today still do not utilize it’s functionality. This allows you to go into any Maximo application, and export data from a query or […]

Blockchain was 2017’s technology buzzword of the year, inspired by developments in cryptocurrencies and a desire for more secure transactions. Blockchain technology has the potential to transform enterprise business models through cost reduction and increased operational efficiency. Yet, there are challenges to adopting Blockchain, as it is a nascent technology. Some of these challenges include: […]

It’s happened in more places and implementations than I can count. A client uses Maximo, and a user, we’ll call him Bob, comes up with some great and useful queries. The easiest way to share it? Make it PUBLIC! This is great that Bob can share the query with everyone that uses Maximo. And then […]

Technology consolidation is constant theme transforming industries. For example, personal computers have merged with tablets and mobile phones as consumers show their interest in computing power on the go. Even applications have gotten smaller, with traditional software replaced by lightweight applications. Logically speaking, the same is happening in the enterprise software world where DevOps, security, […]

Making the move to the cloud can be intimidating. There are many things to consider: What are the best practices? Who are the most knowledgeable vendors? Which is the best solution? But one consideration that should be at the forefront of all cloud migration decisions is security. Many organizations can be hesitant to make the […]

Identity and authentication management is the most crucial component of any migration to Office 365. Office 365 uses the cloud-based user authentication service Azure Active Directory to manage users and offers three identity models: cloud-only, synchronized, and federated. It is important to carefully consider which identity model to use, as well as the cost and […]

Diligence in security implementation for your Microsoft Azure resources is critical. Here are just a few of the ways you can quickly improve your security posture in Azure: Use Security Policies Not only can you define policies for your entire Azure subscription, you can also tailor them for each resource group based on your company’s security […]

While some companies are keen on trimming the number of legacy IT applications through consolidation, they all agree that investments in technology are critical when it comes to operating in a digital world that has created incredibly high customer expectations. The adoption of mobile devices has significantly changed the operating landscape. During his remarks that […]

Cybersecurity is a hot topic across all industries, with most companies recognizing the importance of identifying and mitigating risk factors across IT environments. Recent news headlines have focused on external threats, but internal risks represent over $40 billion in losses annually. When developing an enterprise security plan, it’s important to account for common IT security […]

InterConnect officially kicked off this morning with an opening keynote full of powerhouse companies like Twitter, American Airlines, IndieGoGo, and Delos. Throughout the many and varied speakers, a few key themes emerged: 1. The data explosion is an imminent crisis – one that IBM is tackling. Between the Internet of Things and the ever-increasing velocity of […]

Another HIMSS conference has concluded. It was estimated that more than 45,000 people were at the Orange County Convention Center in Orlando, talking about the latest in health IT, industry trends, and challenges and opportunities. I am always amazed at how social the health IT world is – and it is always great to meet […]

While we can’t always be certain which trends the new year will bring, we can offer predictions based on our conversations with industry executives and our customers, looking at what companies have accomplished in the past year, and the initiatives they already have in place for the future. In fact, that’s exactly how we compiled […]

Recent distributed denial of service attacks (DDOS) is a salient reminder that the continuous threat of security breaches always looms in the public consciousness. Between legal, technical, and business professionals, such events are enough to motivate leadership to pursue relevant cloud security solutions that drive peace-of-mind and customer confidence. Here at Perficient we talk to […]

APIs in the Current World With the advancement of SOA and new-age technologies coming door-to-door, we see how the Internet of Things is touching our everyday lives, be it from Apple Watch and Fitbit to building apps in automobiles, banking, the retail industry, etc. I recently read somewhere that eCommerce for JC Penny is gaining […]

A new quarterly Cybersecurity Market Report was published by Cybersecurity Ventures, projecting $1 trillion will be spent on cybersecurity between 2017 and 2021. According to Steve Morgan, founder and editor-in-chief of Cybersecurity Ventures, the increase in cybercrime, such as ransomware and malware, and the large number of digital devices being rapidly deployed by organizations and […]

Dennis K. Berman, financial editor of The Wall Street Journal, asked one of the simplest, yet greatest questions anyone could ask an executive at a major financial institution. During WSJ’s CFO Network conference, he asked Bank of America Chairman and CEO Brian Moynihan the following: “If you were building a bank today from scratch, what […]